Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of The China Railway Society》 2005-02
Add to Favorite Get Latest Update

Using Binary Tree to Manage Revoked Certificates

NING Hong-zhou, LIU Yun, HE De-quan(School of Electronics and Information Engineering, Beijing Jiaotong University, Beijing 100044, China)  
In view of the complexity of certificate verification response and certificate verification in the 2-3 tree for managing revoked certificates, the binary tree is used to replace the 2-3 tree to manage the revoked certificates. It can simplify the structure of the tree and the attribute of the nods. By using the global number of the nods, locating and indexing of the nods become easy. And by using unique numbering of paths, processing of neighbourship verification is simplified greatly. Thus, the computing efficiency of certificate verification response of the server and certificate verification of the client is improved, and using the binary tree to manage revoked certificates becomes more practical.
【Fund】: 通信与信息系统北京市重点实验室资助(SYS100040408)
【CateGory Index】: TP393.08
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
【References】
Chinese Journal Full-text Database 1 Hits
1 CAI Yong-quan,LIU Yan(College of Computer Science and Technology,Beijing University of Technology,Beijing 100124,China);A Method of User Revocation Using Authentication Tree of Group Signature[J];Journal of Beijing University of Technology;2010-01
【Co-references】
Chinese Journal Full-text Database 4 Hits
1 HUANG Ying-Chun;HE Liang-Sheng;JIANG Fan Department of Computer Scienee and Technology,University of Science and Technology of China,Hefei 230027 The State Key Laboratory of Information Security,Beijing 100039;An Improved Method of Certificate Revocation Based on 2-3 Tree[J];Computer Science;2005-06
2 LI Min,WANG Shang-ping,MA Xiao-jing,QIN Hui(College of Science,Xi'an University of Technology,Xi'an Shanxi 710048,China);Rank Group Signature[J];Application Research of Computers;2006-09
3 Wu Keli1,2 Sun Kangdu1 Zhu Baoping2 Liu Fengyu21(Department of Computer Science,Huaiyin Teachers College,Huaian 223001,Jiangsu,China)2(Department of Computer Science and Technology,Nanjing University of Science and Technology,Nanjing 210094,Jiangsu,China);A DYNAMIC GROUP SIGNATURE SCHEME[J];Computer Applications and Software;2007-09
4 ZHANG Yue-yu,PANG Liao-jun,SU Wan-li,WANG Yu-min(Ministry of Edu.Key Lab.of Computer Network and Information Scurity,Xidian Univ.,Xi'an 710071,China);Efficient group signature scheme with verifier-local revocation[J];Journal of Xidian University;2007-05
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved